MIT Students Create Legal Alternative to Napster
Two MIT students blended some radio practices with some library practices
to create the Libraries Access to Music Project, which is officially authorized
by MIT and supported by research dollars from Microsoft. The system is said
to sidestep the copyright pitfalls that lead to Napster's demise. (The New York
Times)...
Read more
Consortium Cranks Finely Ground Computing Net
It's 2010, stop by the corner store and buy a half-pound of particle-sized
network nodes, then sprinkle them around your house or in your clothing...
Read more
Clemson Students Question Laptop Requirement
Some Clemson University students question the requirement that they own laptops.
The university says they're missing the point...
Read more
PlanetLab Group Envisions Re-Birth of the Internet
Researchers at Princeton, MIT, and 50 other colleges and universities want
to rebuild the Internet, arguing that today's network is like a 1973 Buick retrofitted
with air bags and emissions controls. With the new system, we won't haul hardware
around, and recordable CDs will be as obsolete as the floppy disk...
Read more
Simulations and the Learning Revolution
E-Leaning maven Clark Aldrich says that "educational simulations will
be in widespread use by leading instructors within five years and will eventually
change education" - as much as motion pictures and textbooks already did...
Read more
Charting the Impact of Spam
The Pew Internet & American Life Project found that 60 percent of Americans
have reduced e-mail usage due to Spam. An amazing number of people click on
the "remove me" link (67 percent) or even click to get more information
(33 percent)...
Read more
Beefing up Macs at the University of Michigan
New Power Mac G5s in some of the university's media centers have dual monitors,
a set-up created inexpensively by cannibalizing displays that had previously
been used with earlier models. (The Michigan Daily)...
Read
more
Virtual Hacking and Defense at Iowa State
ISEAGE stands for Internet-Scale Event and Attack Generation Environment,
and that's what will permit Iowa State University Researchers to recreate the
virtual world of the Internet and model attacks and defense. (Science Daily)...
Read more
Universities Coordinate Cyber Attack Simulation
Another cybersecurity research program, EMIST, for Evaluation Methods in Internet
Security Technology, will run on the U.C. Berkeley and USC DETER (Cyber Defense
Technology Experimental Research Network) network. Penn State and Purdue University
will join in the research. (The Daily Democrat)
Read more
Inappropriate Use of ePortfolios at Clemson University
Pornographic materials were put on ePortfolios by varsity athletes at Clemson.
Or, their personal websites were hacked. Either way, this was not what those
who are working on virtual portfolios have in mind. (Myrtle Beach Online)...
Read more
Indiana University Webmail Shut Out of AOL for 5 Days
A spammer used IU relays to transmit mass emails and AOL then blocked all
IU emails to AOL addresses until they and IU staff straightened matters out...
Read more
|